123 Data Security jobs in Ireland
Threat Modelling and Data Security Architect
Posted today
Job Viewed
Job Description
Join Sumitomo Mitsui Finance Dublin Limited (SMFD) as a Threat Modelling & Data Security Architect, driving security-by-design across a complex hybrid IT landscape (on-prem, Azure, GCP, Kubernetes, SaaS, enterprise systems). You will own and evolve the bank's threat modelling program and data security architecture, embedding secure design principles early and delivering scalable, automated controls to protect critical assets and enable innovation
Sumitomo Mitsui Finance Dublin Limited (SMFD)
is a wholly owned subsidiary of SMBC and is growing rapidly as a Centre of Excellence for the bank's universal banking business across EMEA. It provides a range of technology and operational support services, aligned to SMBC's growth, innovation, and transformation strategies.
What You'll Do
- Lead security design reviews, assessing solutions against policies, standards, and best practices.
- Develop and maintain a Security Reference Architecture and reusable design patterns.
- Design and implement security controls to address risks, emerging threats, and compliance needs.
- Own and mature the threat modelling program; identify and prioritise threats with actionable mitigation.
- Maintain a threat & countermeasure library and guide stakeholders in its application.
- Act as SME for data security, including classification, encryption, and access control.
- Develop data domain security controls aligned with data architecture patterns and strategies.
- Collaborate across IT, data, and engineering teams to embed security into projects and systems.
What You'll Bring
- Strong knowledge of security frameworks (NIST CSF v2, ISO/IEC 27001, CIS Benchmarks).
- Proven expertise in secure design principles, architectural patterns, and SSDLC.
- Hands-on experience in Azure and/or GCP security within regulated industries.
- Experience in threat modelling and training non-security stakeholders.
- Knowledge of data security controls, encryption, and access management.
- Familiarity with architectural frameworks (TOGAF, SABSA) and data patterns (Medallion, Data Mesh).
- Hold the rights to work in the EU is mandatory
All third party applications will be managed by Robert Walters.
Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates
Sr. Manager Product Management: Data Security
Posted today
Job Viewed
Job Description
About Trellix:
Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at
Role Overview:
The Sr. Manager Product Management: Data Security position is a strategic, high-visibility role to help own the strategy and vision for products within Trellix's data security portfolio to help us maintain our position as an industry leading data security solution provider.
This position will report to the Sr. Director of Product Management: Data Security and will work cross-functionally with Development, Sales, Marketing, Customer Success, and Senior Leadership teams to plan, design, launch, and scale our product offerings and help solve our customer's problems. The ideal candidate will have a strong passion for technology, as well as several years' experience developing and bringing to market products and solutions in the cyber security and data security markets. This is a senior level position that requires a blend of technical, business and marketing capability as well as strategic thinking and collaboration skills to be successful.
Qualified candidates will be charged with making and encouraging unbiased strategic product decisions based on quantifiable means vs. opinion to give the company the best outcome.
Directs a comprehensive product strategy from product conception and definition through end of life. Functions as a central resource with design, manufacturing, quality, test, marketing and distribution as the product(s) move through their lifecycle. Directs those involved in the design, modification and evaluation of all phases of a specific product or group of products. Formulates and executes long-term plans for cost/profit control. Promotes use of new technologies and industry-leading trends. Selects, develops, and evaluates personnel to
Company Benefits and Perks:
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
- Retirement Plans
- Medical, Dental and Vision Coverage
- Paid Time Off
- Paid Parental Leave
- Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Apply Now
Share This Job
Share on Facebook
Share on X
Share on Linkedin
Share on Email
Sr. Manager Product Management: Data Security
Posted 19 days ago
Job Viewed
Job Description
Sr. Manager Product Management: Data Security
**About** **Trellix:**
**Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work.** Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at .
**_Role Overview:_**
The Sr. Manager Product Management: Data Security position is a strategic, high-visibility role to help own the strategy and vision for products within Trellix's data security portfolio to help us maintain our position as an industry leading data security solution provider.
This position will report to the Sr. Director of Product Management: Data Security and will work cross-functionally with Development, Sales, Marketing, Customer Success, and Senior Leadership teams to plan, design, launch, and scale our product offerings and help solve our customer's problems. The ideal candidate will have a strong passion for technology, as well as several years' experience developing and bringing to market products and solutions in the cyber security and data security markets. This is a senior level position that requires a blend of technical, business and marketing capability as well as strategic thinking and collaboration skills to be successful.
Qualified candidates will be charged with making and encouraging unbiased strategic product decisions based on quantifiable means vs. opinion to give the company the best outcome.
**About the Role**
+ **Product Strategy & Vision**
+ Own the product strategy, roadmap, and vision for Trellix's data security offerings.
+ Define and prioritize product initiatives that align with customer needs, industry trends, and company goals.
+ Identify market opportunities and emerging threats, ensuring Trellix continues to lead in data security innovation.
+ **Cross-Functional Leadership**
+ Partner with Engineering, UX, and QA to define requirements, oversee design, and deliver high-quality features on time.
+ Collaborate with Sales, Marketing, and Customer Success to enable go-to-market readiness, competitive positioning, and customer adoption.
+ Influence senior leadership and stakeholders by presenting clear, data-driven business cases and product recommendations.
+ **Customer & Market Insight**
+ Engage directly with customers, partners, and industry analysts to understand pain points and translate them into actionable product requirements.
+ Monitor competitor strategies and market shifts to anticipate needs and adjust product direction accordingly.
+ **Lifecycle Management**
+ Oversee the entire product lifecycle-from ideation and requirements gathering to launch, adoption, and end-of-life decisions.
+ Drive release planning, pricing strategies, and success metrics to ensure profitability and long-term growth.
+ **Metrics & Execution**
+ Define KPIs and success criteria for product performance, adoption, and customer satisfaction.
+ Promote a culture of making strategic decisions based on quantifiable data, customer feedback, and measurable outcomes.
+ **Team Leadership**
+ Mentor and develop a high-performing product team, fostering growth and accountability.
+ Encourage innovation, collaboration, and continuous improvement across the product organization.
**About You**
+ **Education & Experience**
+ Bachelor's degree in Computer Science, Engineering, Business, or a related field
+ 8+ years of experience in product management, with **at least 5 years in cybersecurity or data security** .
+ Proven track record of managing enterprise security products-preferably in **data security, DLP, encryption, CASB, or related domains** .
+ Experience leading cross-functional teams and successfully launching complex products in global markets.
+ **Domain Knowledge**
+ Strong understanding of the cybersecurity ecosystem, including data security, regulatory compliance, and cloud security trends.
+ Familiarity with endpoint security, threat intelligence, SIEM/SOAR, and adjacent solutions is a plus.
+ Ability to articulate technical concepts (e.g., data classification, policy enforcement, insider threat protection) to both technical and business audiences.
+ **Skills & Competencies**
+ Strategic thinker with demonstrated ability to define vision and translate it into actionable roadmaps.
+ Strong analytical skills with proficiency in data-driven decision-making.
+ Exceptional communication and presentation skills, with ability to influence at all levels of the organization.
+ Comfortable navigating ambiguity while driving clarity and measurable results.
+ Experience with Agile methodologies, product management tools (e.g., Jira, Aha!), and SaaS/cloud environments.
+ **Leadership Attributes**
+ High level of initiative and ownership; able to thrive in a fast-paced, innovative environment.
+ Proven ability to build consensus, rally stakeholders, and deliver products that delight customers.
+ Commitment to Trellix's mission of delivering **soulful work** and helping customers build resilience against today's most advanced threats.
**_Company Benefits and Perks:_**
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
+ Retirement Plans
+ Medical, Dental and Vision Coverage
+ Paid Time Off
+ Paid Parental Leave
+ Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security (InfoSec) Analyst
12 month fixed term ( very likely to go longer)
Location:
Dublin West - 3 Days on site, Dublin West outside of the M50
Eligibility:
Open to candidates who do
not
require visa sponsorship
Stamp 1G (Spouse), Stamp 1G (Graduate, 12+ months remaining), Stamp 4 or EU passport holders.
We're looking for an Information Security Analyst to join a growing Cyber Security team, playing a key role in strengthening the organisation's security posture.
This role focuses on risk management, compliance, documentation and preparation for the upcoming NIS2 Directive.
Reporting into a Senior Information Security Manager, you'll help ensure the confidentiality, integrity and availability of data across a complex vendor ecosystem.
It's a hands-on governance and assurance role with a strong focus on vendor compliance, policy development and the continuous improvement of security controls and practices.
About You
- Previous experience in Information Security, Risk Management or Compliance.
- Previous experience vendor risk and third-party compliance.
- Excellent communication and stakeholder management skills.
- Knowledge of GDPR, ISO/IEC 27001 or NIS2 requirements. (Not a major thing if you don't)
- (Bonus) Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer.
Key Responsibilities
- Support audits, assurance activities and evidence collection for compliance frameworks.
- Conduct and maintain risk assessments to identify and address threats and vulnerabilities.
- Collaborate across Legal, Compliance and IT to embed effective security governance.
- Foster a strong security and compliance culture across the organisation and partner network.
- Monitor and improve third-party/vendor compliance obligations.
This is a great role someone who has wants to grow their experience in security, governance, vendor risk and compliance
Information Security Analyst
Posted today
Job Viewed
Job Description
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This RoleEvaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
What Part Will You Play?- Gains and maintains knowledge of how to monitor complex systems and response to known and emerging threats against the Global Payments network via intrusion detection software
- Assists in detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
- Under close supervision performs incident handling process by gaining knowledge in implementation of containment, protection and remediation activities.
- Gains and maintains knowledge of new and emerging threats that can affect the organization's information assets by assisting in analysis of third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
- Under close supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
- Assists in assessing and disseminating threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
- Develops an understanding of how to assess risks based on changes to implementation of ISO(International Organization for Standardization)/BSO(Business Services Online); gains knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
- Gains knowledge of how to create cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
- Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience in a related field.
- Typically No Relevant Experience Required
Preferred Qualifications
- Typically Minimum 2 Years Relevant Exp
- Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.))
- Skills / Knowledge - Learns to use professional concepts. Applies company policies and procedures to resolve routine issues.
- Job Complexity - Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Builds stable working relationships internally.
- Supervision - Normally receives detailed instructions on all work.
- Risk Assessment - Ability to identify, communicate, and mitigate risk within technical solution designs
- Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
- Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst - Dublin
ICON plc is a world-leading healthcare intelligence and clinical research organization. We're proud to foster an inclusive environment driving innovation and excellence, and we welcome you to join us on our mission to shape the future of clinical development.
Information Security Analyst
At ICON, it's our people that set us apart. Our diverse teams enable us to become a better partner to our customers and help us to fulfil our mission to advance and improve patients' lives.
Our 'Own It' culture is driven by four key values that bring us together as individuals and set us apart as an organisation: Accountability & Delivery, Collaboration, Partnership and Integrity. We want to be the Clinical Research Organisation that delivers excellence to our clients and to patients at every touch-point. In short, to be the partner of choice in drug development.
That's our vision. We're driven by it. And we need talented people who share it.
If you're as driven as we are, join us. You'll be working in a dynamic and supportive environment, with some of the brightest and the friendliest people in the sector, and you'll be helping shape an industry.
The Role
We are currently recruiting for an Information Security Analyst to work in the Governance, Risk & Compliance segment of our Cyber Security Team. This is a really great time to join this division as it is undergoing significant development and you will be joining at a time of exciting change with lots of opportunities for growth and development.
Responsibilities
- Perform activities in the support of one or more information security management practices, such as security compliance, security risk assessment and management, security policy management.
- Ensure activities are performed in accordance with company policies and industry standard frameworks (e.g., NIST CSF, NIST RMF and ISO
- Perform information security risk assessments, security compliance continuous monitoring, and/or various regulatory or contractual compliance activities.
- Work with other key stakeholders (e.g., quality assurance, legal, data protection office, business continuity, and other information technology business units) to ensure the organization analyzes and communicates information security risks and status of controls compliance effectively.
- Participate in the development of training and communication materials for key stakeholders of the process within your area of control or expertise.
- Advise and educate stakeholders on managing cybersecurity risks and information assurance activities in accordance with ICON's policies and procedures.
- Participate in authoring and reviewing information security policies and procedures pertaining to information security risk management and information assurance activities.
- Assist in the development of reports relating to the effectiveness of the cybersecurity risk management and assurance program.
- Perform ancillary tasks to support the strategic mission and objectives of the Cyber and Information Security department, as needed.
- Research and stay current on new technical literature applicable to information security, risk management, and information assurance.
- Assist in the development of metrics relating to the Cybersecurity Risk Management and Assurance team's business functions/processes.
Desired Qualifications
- Working technical knowledge of industry best practices and commonly used frameworks & standards (e.g., NIST 800-53/171, COSO, SOC/SSAE 18, COBIT, ISO ,) and various regulations pertaining to information security, cyber risk management, compliance, and data privacy (e.g., SOX, GDPR, HIPAA, GxP/GALP/GMP).
- Prior experience using an integrated risk management tool (e.g., ServiceNow) and/or vendor risk management tool (e.g., Process Unity) is a plus.
- Possess basic-to-intermediate understanding of risks and controls pertaining to technical, management, and operations security controls, system development lifecycle, business continuity, disaster recovery, data center controls, cloud computing, third-party risk management and privacy.
- Holds a CISSP, CISM, CISA, CRISC, ISO 27001 Lead Auditor or Implementer or similar certification; desirable but not required.
Minimum Requirements
- Fundamental relationship management and communications skills.
- Fundamental ability to solve problems and apply skills to determine risk or compliance deviations.
- Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Enterprise Risk Management or related field or equivalent experience and one year of risk management, cybersecurity, compliance or related experience (or combined equivalent education, training, and experience).
- Excellent written and verbal communication skills.
- Read, write and speak fluent English, with strong documentation and organizational skills.
Benefits Of Working In ICON
Our success depends on the quality of our people. That's why we've made it a priority to build a culture that rewards high performance and nurtures talent.
We offer very competitive salary packages. And to keep them competitive, we regularly benchmark them against our competitors. Our annual bonuses reflect delivery of performance goals – both ours and yours.
We also provide a range of health-related benefits to employees and their families and offer competitive retirement plans – and related benefits such as life assurance – so you can save and plan with confidence for the years ahead.
But beyond the competitive salaries and comprehensive benefits, you'll benefit from an environment where you are encouraged to fulfil your sense of purpose and drive lasting change.
ICON is an equal opportunity and inclusive employer and is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know through the form below.
What ICON Can Offer You
Our success depends on the quality of our people. That's why we've made it a priority to build a diverse culture that rewards high performance and nurtures talent.
In addition to your competitive salary, ICON offers a range of additional benefits. Our benefits are designed to be competitive within each country and are focused on well-being and work life balance opportunities for you and your family.
Our Benefits Examples Include
- Various annual leave entitlements
- A range of health insurance offerings to suit you and your family's needs.
- Competitive retirement planning offerings to maximize savings and plan with confidence for the years ahead.
- Global Employee Assistance Programme, LifeWorks, offering 24-hour access to a global network of over 80,000 independent specialized professionals who are there to support you and your family's well-being.
- Life assurance
- Flexible country-specific optional benefits, including childcare vouchers, bike purchase schemes, discounted gym memberships, subsidized travel passes, health assessments, among others.
Visit our careers site to read more about the benefits ICON offers.
At ICON, inclusion & belonging are fundamental to our culture and values. We're dedicated to providing an inclusive and accessible environment for all candidates. ICON is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know or submit a request here
Interested in the role, but unsure if you meet all of the requirements? We would encourage you to apply regardless – there's every chance you're exactly what we're looking for here at ICON whether it is for this or other roles.
Are you a current ICON Employee? Please click here to apply
Information Security Analyst
Posted today
Job Viewed
Job Description
Summary
Description
Summary of This Role
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
What Part Will You Play?
- Gains and maintains knowledge of how to monitor complex systems and response to known and emerging threats against the Global Payments network via intrusion detection software
- Assists in detailed, comprehensive investigation of security issues by reviewing security log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety of security events.
- Under close supervision performs incident handling process by gaining knowledge in implementation of containment, protection and remediation activities.
- Gains and maintains knowledge of new and emerging threats that can affect the organization's information assets by assisting in analysis of third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
- Under close supervision designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
- Assists in assessing and disseminating threats related to the enterprise in regard to current vulnerability by managing and developing an emerging threat model.
- Develops an understanding of how to assess risks based on changes to implementation of ISO(International Organization for Standardization)/BSO(Business Services Online); gains knowledge of PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information), and Card personalization.
- Gains knowledge of how to create cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
- Works under close supervision to perform day-to-day Information Security functions pertaining to numerous security software products and processes.
What Are We Looking For in This Role?
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience in a related field.
- Typically No Relevant Experience Required
Preferred Qualifications
- Typically Minimum 2 Years Relevant Exp
- Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; common security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.))
What Are Our Desired Skills and Capabilities?
- Skills / Knowledge - Learns to use professional concepts. Applies company policies and procedures to resolve routine issues.
- Job Complexity - Works on problems of limited scope. Follows standard practices and procedures in analyzing situations or data from which answers can be readily obtained. Builds stable working relationships internally.
- Supervision - Normally receives detailed instructions on all work.
- Risk Assessment - Ability to identify, communicate, and mitigate risk within technical solution designs
- Industry Knowledge - Continued self-education of new and emerging threats and relevant processes, controls, or technologies to mitigate them.
- Incident Response - Knowledge and skills to contribute to all phases of Incident Response.
Be The First To Know
About the latest Data security Jobs in Ireland !
Senior Information Security Analyst
Posted today
Job Viewed
Job Description
About The ServiceNow Security Office
The **ServiceNow Security Organization** is dedicated to delivering **world-class, innovative security solutions** that minimize risk and protect both our company and our customers. By enabling the secure migration of sensitive data and workloads to the cloud, we help accelerate ServiceNow's position as the **most trusted SaaS provider** in the industry.
We are committed to fostering an environment where our employees feel empowered, take pride in their work, and have the opportunity to make a meaningful impact.
**About the Team - Global Security Support Center (GSSC)**
The **Global Security Support Center (GSSC)** at ServiceNow is a diverse and highly skilled team of security professionals who play a pivotal role in strengthening both our internal and external security posture. The team collaborates closely with various functions across the company and serves as a key interface with our customers on security-related matters.
Through expertise, communication, and a commitment to excellence, the GSSC team reinforces ServiceNow's reputation as a **security-first organization** , consistently demonstrating our commitment to protecting our platform, our data, and our customers.
GSSC Mission Statement: To provide external & internal facing security support on behalf of the Security Organization to improve our customers' security posture and build Customer trust.
**Job Description**
**Responsibilities on the role: **
+ Represent security organization in customer-facing Security Incidents, cases, Security findings, tasks and questions and calls related to Security & Privacy.
+ Own, triage, investigate and respond to security matters of ServiceNow platform, ensuring timely communication, resolution and enhance customer experience and processes.
+ Act as the primary point of contact for all security-related matters in ServiceNow, supporting both internal and external stakeholders.
+ Facilitate the efficient workflow/triage of security-related incidents/cases by collaborating with customers and other internal ServiceNow teams.
+ Build and maintain a high level of customer trust and confidence through exceptional service and communication.
+ Customer Outreach Communications on Security & escalation handling.
+ Understand and deliver excellent capability maturity models to fine tune Security processes.
+ Create and enhance documentation and processes to strengthen security maturity and operational excellence.
+ Develop and deliver training/enablement programs on Security, for internal and external customers on security awareness and best practices.
+ Develop AI Solutions for automating repetitive activities & design new solutions leveraging AI.
+ Work with Legal on security/privacy-related matters & a global team spread across different time zones, so flexibility of times is required.
+ Provide support and be available as a responsible resource for the On-Call rotation (weekends, public holidays, and after hours) as rostered.
**To be successful in this role, you have:**
+ Experience: A minimum of 3-5+ years of professional experience in information security or application security roles.
+ Certifications: Relevant certifications are highly preferred, including but not limited to:
+ **Required** : ServiceNow Certified System Administrator (CSA)
+ **Preferred** (Two or more): Azure AI Fundamentals, AWS Certified AI Practitioner, Offensive Security Web Assessor (OSWA), GIAC Web Application Penetration Tester (GWAPT), GIAC Security Essentials Certification (GSEC), GIAC Certified Incident Handler (GCIH), CISSP, CISM.
**Skills & Competencies**
+ Technical Skills:
+ Solid understanding of cloud computing models and major hyperscaler cloud models.
+ Hands-on experience with using and understanding security tools and technologies, including: SIEM solutions, logging tools, load balancers, firewalls, WAFs, IDS/IPS, vulnerability management platforms, encryption techniques etc.
+ Basic to Intermediate-level programming knowledge in **Java/JavaScript** with the ability to read, interpret & understand to explain code effectively.
+ Intermediate to Advanced proficiency in using web proxy tools for security testing and assessments.
+ Application Security: In-depth understanding of web application vulnerabilities (e.g., OWASP Top Ten) and corresponding mitigation strategies.
+ Risk Management: Ability to clearly explain security risks to non-technical stakeholders using straightforward, non-technical language.
+ Compliance & Regulatory Knowledge: Good knowledge of key compliance and regulatory frameworks including: NIST, CIS, GDPR, HIPAA, PCI DSS, ISO standards etc.
+ Artificial Intelligence: Experience working with AI technologies and designing AI-based solutions.
+ Analytical Thinking: Strong analytical and problem-solving capabilities, with the ability to evaluate and address complex security challenges.
+ Communication: Excellent verbal and written communication skills, with the ability to convey technical information to non-technical audience.
+ Team Collaboration: Demonstrated ability to thrive in a team-oriented, collaborative environment working in a follow the sun model.
+ Security Concepts: Good understanding of Security concepts and articulating Security and risk in simple terms without using jargons and make sense to customers.
+ Education: Bachelor's degree in computer science or information security or relevant information security experience.
+ Preferred Additional Experience: Hands-on experience with web-based vulnerability exploitation and experience is a strong plus to succeed in this role.
At GSSC, we pride ourselves on fostering a culture of inclusivity, innovation, and excellence. Our team and customers are at the heart of everything we do, and we are committed to providing a supportive and engaging work environment. As an Information Security and Application Security resource in the region, you will be an integral part of our mission to deliver secure and reliable solutions to our clients.
FD21
**Work Personas**
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here ( . To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
**Equal Opportunity Employer**
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
**Accommodations**
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact for assistance.
**Export Control Regulations**
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
Data Centre Security Specialist, SOC Analyst
Posted today
Job Viewed
Job Description
This job is with Amazon, an inclusive employer and a member of myGwork – the largest global platform for the LGBTQ+ business community. Please do not contact the recruiter directly.
Description
In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services -- now commonly known as cloud computing. One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the Cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster. Today, Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with data center locations in the U.S., Europe, Brazil, Singapore, Japan, and Australia.
Project Description
There is growing interest to use textual data from official sources to supplement financial analysis. Textual content (tweets, news, regulatory reports, emails, memos, .) provides more data than accounting and price information, which explains why text as a form of data is experiencing rapid growth in economic and financial analysis. Each SEC filing contains thousands of characters of text and tables in multifaceted sections. A single study by the IMF processed 4 million news articles. The students will work to create a toolkit that showcases an AI solution targeted at fintech.
Key job responsibilities
- You will manage a chat queue, phone communications, generate and/or manage trouble tickets, handle incoming chats, and provide support to customers.
- Drive security awareness campaigns aimed at enhancing security vigilance and effectiveness
- You will manage workflow ticketing and extraction/development of performance metrics
- Configure physical security devices including cameras, readers, and panels.
- Support daily operational security across a data centre campus
About The Team
ASSET (Advanced Security System Engineer Team) provide support to AWS Data Centre Security teams across EMEA with security device troubleshooting and programming on access control and CCTV.
Basic Qualifications
- -1 to 5 years experience in Data Centre operations room/centre.
- -Exposure to Physical Security operations. -Configuration of security devices including cameras readers and panels.
- -Great customer service skills.
Preferred Qualifications
- Experience in technical support, or experience managing full application stacks from the OS up through custom applications and experience in networking administration and troubleshooting
- -An understanding of how to configure physical security devices including cameras, readers, and panels.
- -Experience working in a data centre environment.
- -Experiance in working in a SOC environment.
- -Certification for Lenel Onguard programming.
Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice ) to know more about how we collect, use and transfer the personal data of our candidates.
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Data Centre Security Specialist, SOC Analyst
Posted today
Job Viewed
Job Description
Description
In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services -- now commonly known as cloud computing. One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the Cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster. Today, Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with data center locations in the U.S., Europe, Brazil, Singapore, Japan, and Australia.
Project Description
There is growing interest to use textual data from official sources to supplement financial analysis. Textual content (tweets, news, regulatory reports, emails, memos, .) provides more data than accounting and price information, which explains why text as a form of data is experiencing rapid growth in economic and financial analysis. Each SEC filing contains thousands of characters of text and tables in multifaceted sections. A single study by the IMF processed 4 million news articles. The students will work to create a toolkit that showcases an AI solution targeted at fintech.
Key job responsibilities
- You will manage a chat queue, phone communications, generate and/or manage trouble tickets, handle incoming chats, and provide support to customers.
- Drive security awareness campaigns aimed at enhancing security vigilance and effectiveness
- You will manage workflow ticketing and extraction/development of performance metrics
- Configure physical security devices including cameras, readers, and panels.
- Support daily operational security across a data centre campus
About The Team
ASSET (Advanced Security System Engineer Team) provide support to AWS Data Centre Security teams across EMEA with security device troubleshooting and programming on access control and CCTV.
Basic Qualifications
- -1 to 5 years experience in Data Centre operations room/centre.
- -Exposure to Physical Security operations. -Configuration of security devices including cameras readers and panels.
- -Great customer service skills.
Preferred Qualifications
- Experience in technical support, or experience managing full application stacks from the OS up through custom applications and experience in networking administration and troubleshooting
- -An understanding of how to configure physical security devices including cameras, readers, and panels.
- -Experience working in a data centre environment.
- -Experiance in working in a SOC environment.
- -Certification for Lenel Onguard programming.
Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice ) to know more about how we collect, use and transfer the personal data of our candidates.
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
Company
- Amazon Data Services Ireland Limited - A65
Job ID: A